SEO blogs

05 June 2020

SEO blogs
No events
June 2020
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30

Blog Calendar - Computers / I.T.

« June 2020 »
Mon Tue Wed Thu Fri Sat Sun
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30          

Cyber Security Blogs

05 June 2020

Cyber Security Blogs
  • New Research: "Privacy Threats in Intimate Relationships"
    05 June 2020

    I just published a new paper with Karen Levy of Cornell: "Privacy Threats in Intimate Relationships."

    Abstract: This article provides an overview of intimate threats: a class of privacy threats that can arise within our families, romantic partnerships, close friendships, and caregiving relationships. Many common assumptions about privacy are upended in the context of these relationships, and many otherwise effective protective measures fail when applied to intimate threats. Those closest to us know the answers to our secret questions, have access to our devices, and can exercise coercive power over us. We survey a range of intimate relationships and describe their common features. Based on these features, we explore implications for both technical privacy design and policy, and offer design recommendations for ameliorating intimate privacy risks.

    This is an important issue that has gotten much too little attention in the cybersecurity community.

  • Keynote at the Rocheston Reinvent Cybersecurity Conference
    05 June 2020

    Every crises has an opportunity. If we look at COVID 19 all those conferences which I was travelling at and you wanted to join but could can now do so, as all those conferences became online and most of them are now FREE. Like the one from Rocheston Reinvent , you will have many Cybersecurity […]

    The post Keynote at the Rocheston Reinvent Cybersecurity Conference appeared first on Dr. Erdal Ozkaya Personal Blog.

  • Sophos Confirms Restructuring Plans, Denies Blog Closure
    05 June 2020
    Sophos Confirms Restructuring Plans, Denies Blog Closure

    Sophos has confirmed that it is implementing some internal restructuring, but denied that it plans to close its Naked Security blog.

    Following reports which emerged last night about Sophos’ plans to furlough staff and close the award-winning blog, a spokesperson for Sophos has confirmed plans to restructure in response to market conditions associated with COVID-19 and “to accelerate the evolution already underway to our next-gen product portfolio, which features our most advanced cloud-managed protection capabilitiesand is the fastest growing part of our business.”

    The spokesperson added: “A restructuring is always a difficult decision, but we believe it is necessary to position Sophos for continued growth and success in the years to come, and to continue to provide advanced, world-class protection for our customers.

    “Sophos is appreciative of the contributions made by all our team members in supporting the company’s mission to protect people from cybercrime by developing powerful and intuitive products and services that provide the world’s most effective cybersecurity for organizations of any size.”

    In the first quarter of 2020, Sophos grew billings 14% overall, its next-gen products represented over 63% of its business and the company grew 37% year-on-year.

    Answering a question with regard to the future of the 10-year-old Naked Security blog, which earlier this week collected two European Security Blogger Awards for Best Corporate Blog and Best Overall Blog, Sophos said: “We can assure you that Naked Security will continue to be a source of information moving forward. Sophos is increasing focus on threat research and security investigations. As a result, we’ll do more original reporting and deep analysis.”

    Security blogger and speaker Graham Cluley said in his blog that he had heard that Naked Security would be “mothballed” and he sent his “best wishes to old friends at Sophos facing possible redundancy.

    “So many vendors over the years were jealous of the power that Naked Security commanded, and how it helped Sophos punch far above its weight in terms of brand awareness and thought leadership,” he said.

  • Weekly Update 194
    05 June 2020

    It's a total mixed bag this week with a couple of new blog posts thrown in to boot. An award at an event nobody could attend, a SQL injection pattern in an HIBP email that wiped an entire DB, a disinformation campaign by "Anonymous" amidst a tumultuous time in the US and another freaking massive breach (with me in it) that I simply can't attribute. So yeah, life remains pretty unpredictable then 🙂

    1. I won the "Best Cybersecurity Video OR Cybersecurity Video Blog" at the European Cybersecurity Blogger Awards! (shame I couldn't be in London for it this year, but totally stoked to get an award!)
    2. Without knowing it, I also wiped an entire ticketing system with a SQL injection pattern inside an HIBP email (this is funny - it just is 🤣)
    3. The Minneapolis Police Department hack and subsequent leak of data is... not (cobbling together previously leaked MPD emails does not make it an MPD "hack")
    4. I got pwned in the "Lead Hunter" data breach and I've got no idea what it is (I'm still not entirely clear, although there's a solid lead in the comments I must follow up)
    5. Sponsored by NordVPN, the leading VPN provider. 5000+ servers in 59 countries. Use on 6 devices at the same time, on every major platform.
  • Why abandoned domain names are so dangerous
    05 June 2020

    Email holds the keys to the kingdom. All your password resets go through email, and abandoning an old domain name makes it easy for attackers to re-register the old domain and get your stuff.

    [ Keep up with 8 hot cyber security trends (and 4 going cold). Give your career a boost with top security certifications: Who they're for, what they cost, and which you need. | Sign up for CSO newsletters. ]

    The problem is especially grave for law firms where partnerships form, dissolve, and merge often, security researcher Gabor Szathmari points out. A merger or acquisition typically involves either new branding for the new firm, with a new domain name to match, or the acquired firm dropping their old branding and domain name. Letting those old domains expire is dangerous.

    To read this article in full, please click here

  • Q&A: Box CEO Aaron Levie looks at the future of remote work
    05 June 2020
    Once a company focused on cloud-based file-sharing, Box now offers features to support remote productivity and teamwork. CEO Aaron Levie talks about his company's evolution – and how the workplace continues to change. (Insider Story)
  • HTTP Security Headers: An Easy Way to Harden Your Web Applications
    05 June 2020
    Modern browsers support many HTTP headers that can improve web application security to protect against clickjacking, cross-site scripting, and other common attacks. This article provides an overview of HTTP security headers, as presented by Netsparker security researcher Sven Morgenroth in a recent interview on Security Weekly. READ MORE
  • Facebook Labels State-Controlled Media Ahead of US Elections
    05 June 2020
    Facebook Labels State-Controlled Media Ahead of US Elections

    Facebook has started labelling content from state-controlled media outlets as part of an ongoing push-back against misinformation and coordinated propaganda on the platform.

    Promised last October as part of the social network’s efforts to combat attempts to influence US elections, the firm will put clear labels on content from such outlets in its Ad Library Page view, on Pagesand in the Page Transparency section.

    The firm will also be blocking ads from state media in a month or two “out of an abundance of caution to provide an extra layer of protection against various types of foreign influence in the public debate ahead of the November 2020 election in the US,” said Facebook head of cybersecurity policy, Nathaniel Gleicher.

    He explained that Facebook had consulted 65 media, governance and human rights experts around the world to draw up the criteria for what constitutes state-controlled media. It goes beyond funding to examine whether editorial control is being exerted by a government.

    Factors such as editorial guidelines, ownership structure, info on newsroom leadership and governance and accountability mechanisms were all taken into account.

    News organizations wanting to claim independence must be able at a minimum to demonstrate established procedures, processes and protections and a statute in the country to protect editorial independence; as well as an independent assessment by a credible third-party organization that the statute has been complied with.

    “We also consider country-specific factors, including press freedom and we consult open-source research conducted by academics and leading experts,” Gleicher explained.

    Last year, Chinese state-owned news channel CGTV was forced to register as a foreign agent in the US after pressure from Washington.

    It will be a tense few months coming up for social media platforms as both sides of the political debate complain of bias against them. Most recently, Twitter has drawn the ire of Donald Trump by placing fake news labels on his tweets and by hiding one post made during recent riots for incitement to violence.

    That same post, which repeated an infamous phrase first uttered by a racist 1960s police chief about looters, was controversially left untouched on Facebook, prompting dismay from civil rights leaders and employees.

  • Cyber Defense Magazine – July 2020 has arrived. Enjoy it!
    05 June 2020
    Cyber Defense Magazine June 2020 Edition has arrived. We hope you enjoy this month’s edition…packed with over 165 pages of excellent content.

    Cyber Defense Magazine June 2020 Edition has arrived. Tips, tricks, ideas, secrets and insider information on the best practices incybersecurity.  Please read it and share it with your friends.  With much appreciation to our sponsors.

    Learn from the experts, cybersecurity best practices

    Find out about upcoming information security related conferences, expos and trade shows.  Always free, no strings attached.





    Enjoy and Thank You for Joining Us!
    Let’s get one step ahead of the next threat,

    Cyber Security Magazine
    with a Consumer Focus (B2C)***NEW***
    Don’t miss out: June 17, 2020 at 2pm EDT – a breaktrhough Cyber Defense Webinar
    Game Changing Breach Defense by Dramatically Improving Endpoint Security

    Cyber Defense Webinars

    Please visit CYBER DEFENSE TV and watch our latest interviews…We have 80+ NEW INTERVIEWS BEING UPLOADED THIS MONTH!!!Please visit Cyber Defense Radio for streaming and downloadable podcasts…Thanks to this month’s sponsors:








    SMEWant to sponsor our eMagazine? 

    Checkout our 
    media kit and reach out to This email address is being protected from spambots. You need JavaScript enabled to view it.

    Pierluigi Paganini

    (SecurityAffairs â€“ cyber defense magazine, cybersecurity)

    The post Cyber Defense Magazine – July 2020 has arrived. Enjoy it! appeared first on Security Affairs.

  • Google reveals that foreign hackers are already targeting Trump and Biden campaigns
    05 June 2020
    Google researchers revealed that campaign staffs for both President Donald Trump and Joe Biden have been targeted recently by foreign hackers.

    Foreign hackers are targeting campaign staffs for both President Donald Trump and Democratic rival Joe Biden ahead of the November US election.

    The news was revealed by Google in a series of tweets published by Google’s threat analysis chief Shane Huntley.

    Google TAG revealed that China-linked cyberespionage group APT31 is targeting Biden campaign staff, while the Iran-linked APT35 group is targeting Trump campaign staff with spear-phishing attacks.

    Huntley invites people involved in campaigns for this election to use the best protection they can, including two factor authentication or Advanced Protection.

    The groups involved are ones referred to as APT31 and APT35.

    — Shane Huntley (@ShaneHuntley) June 4, 2020

    The good news is that there is no sign of compromise. anyway, Google already informed its users and informed law enforcement.

    Google urges candidates and members of campaigns to improve their security and protect their information.

    “From candidates to canvassers, every member of a campaign should understand how to add extra layers of security and protect their information. We recommend everyone associated with political campaigns enroll in ourAdvanced Protection Program, which bundles all our strongest Google Account security options together.” reads a post published by Google in February. “Advanced Protection is available for both personal and G Suite accounts and we recommend campaign members enroll both types of accounts in the program, which they can now enroll instantly with their Android or iPhone.”

    US government fears the influence of foreign hackers and wants to avoid incidents like the 2016 Democratic National Convention (DNC) hack that had a serious impact on 2016 Presidential election.

    “This is a major disclosure of potential cyber-enabled influence operations, just as we saw in 2016,” said Graham Brookie, director of the Atlantic Council’s Digital Forensics Research Lab, warning of future potential influence operations.

    This is a major disclosure of potential cyber-enabled influence operations, just as we saw in 2016.

    The part here disclosed by @ShaneHuntley's team at @Google is the cyber-enabled pre-cursor to potential influence operations.

    It's a necessary reminder, especially to campaigns.

    — Graham Brookie (@GrahamBrookie) June 4, 2020

    Huntley added that Google is offering free physical security key hardware and other assistance to US presidential and congressional campaigns.

    Pierluigi Paganini

    (SecurityAffairs â€“ foreign hackers, cybersecurity)

    The post Google reveals that foreign hackers are already targeting Trump and Biden campaigns appeared first on Security Affairs.

Author Information
Latest Articles